
The 2026 Cyber Horizon: Agentic AI, Identity, and the Shift to Preemptive Defense
31/12/2025 | 32 mins.
As the cybersecurity landscape transitions from reactive detection to automated preemption, this series explores how the rise of "Agentic AI" and autonomous threats are forcing organizations to radically modernize their security stacks. We dive deep into the essential governance strategies for the year ahead, including the adoption of the new NIST SP 800-63-4 digital identity guidelines and the necessity of moving toward phishing-resistant, passwordless authentication. Join us to discover how CISOs are optimizing budgets to combat deepfakes and supply chain risks while preparing for a regulatory environment that demands continuous, demonstrable compliance. Sponsors: www.cisomarketplace.com www.cisomarketplace.services https://securitybydesign.shop

Secure by Design: Integrating AI into Operational Technology
30/12/2025 | 19 mins.
Join us as we explore the comprehensive guidance released by international cybersecurity agencies, including CISA and the NSA, regarding the integration of Artificial Intelligence into critical infrastructure environments. We will break down the four key principles for owners and operators, which range from understanding unique AI risks—such as model drift and lack of explainability—to embedding necessary oversight and failsafe practices. Finally, we discuss how to balance the efficiency and predictive capabilities of AI with the absolute necessity of maintaining functional safety and data security in operational technology. Sponsors: www.cisomarketplace.com www.cisomarketplace.services

Building Resilience: Bridging DORA Requirements with ISO 27001 Controls
29/12/2025 | 14 mins.
Join us as we explore the critical alignment between the EU’s Digital Operational Resilience Act (DORA) and the ISO 27001:2022 standard, demonstrating how financial entities can leverage existing ISMS frameworks for regulatory compliance. We break down the detailed mapping of governance, third-party risk management, and incident reporting, turning complex regulatory requirements into actionable security controls. Whether you are managing critical ICT functions or preparing for threat-led penetration testing, this episode provides the practical blueprint to help your organization meet DORA's mandatory resilience standards. Sponsor: www.compliancehub.wiki

Resilience Redesigned: Architecting the Agentic and Post-Quantum Future
28/12/2025 | 42 mins.
As 2026 approaches, cybersecurity leaders face a "strategic redesign" that prioritizes resilience and recovery over mere prevention to handle the $20 trillion cybercrime economy. This episode explores the critical convergence of autonomous Agentic AI, the urgent mandate for Post-Quantum Cryptography (PQC), and the cementing of Zero Trust as a non-negotiable regulatory standard. Tune in to understand how self-healing infrastructure and decentralized identity frameworks are reshaping the digital defense landscape for long-term survival. Sponsor: www.cisomarketplace.com www.quantumsecurity.ai

The Ingredient List: Surviving the Supply Chain Crisis of 2025
27/12/2025 | 15 mins.
In 2025, software supply chain attacks have surged by 34%, with threat actors like Salt Typhoon exploiting a "lack of visibility" to target critical infrastructure and manufacturing sectors. This episode explores the permanent "SolarWinds Effect" on executive liability and how CISA’s updated 2025 SBOM mandates are forcing organizations to cryptographically prove the integrity of their software "ingredients". Finally, we analyze the shift from static vendor questionnaires to continuous, AI-driven Zero Trust architectures designed to limit the blast radius of inevitable third-party breaches Sponsor: www.secureiot.house www.secureiotoffice.world



CISO Insights: Voices in Cybersecurity